4 posts total
Today I discovered the #MagicWormhole protocol. There are desktop and mobile apps and it essentially allows the transfer of a file between any two computers, as long as they are both online. You select a file, it generates both a QR code and a seed phrase of sorts that you can then give to a recipient to plug into their application, and transfer a file. I have my own home server, but for one off transfers of files that are too big for email or a messenger, this would be easier. @gerowen https://github.com/timvisee/send-instances/#instances Private, encrypted, open-source file transfer. It used to be "Firefox Send", but Mozilla discovered people sent things Mozilla wanted no part of. So since it was open source, other people started running servers. I find it's super useful for transferring log files around the world. The sound didn't get captured, but I recently started hosting my own #Minetest / #Mineclone2 server here at home for my close family, and this is an experimental build for defending my home when it's dark outside. The monsters are a LOT more aggressive in this than in regular Minecraft, and there's more of them. I did widen the hole out to be 3 long by 2 wide so that spiders will fit down it. @gerowen Oh, we also got private server that @sarahquartz runs for us. Can confirm - mobs are very aggressive, especially creepers :ablobfoxbongoterrified:
|
@gerowen womp womp
@gerowen #whocouldhavepredicted
@gerowen Perhaps I should read the article itself, but the summary makes it sound like a nothing burger.
Of course they could get hacked. Name me a service that couldn't. Does the article mention anything that makes them particularly vulnerable, or is it just about how bad such a hack would potentially be because of the nature of the information they store?
Edit: typo
Edit 2: Oh. That's not good.
@gerowen Perhaps I should read the article itself, but the summary makes it sound like a nothing burger.
Of course they could get hacked. Name me a service that couldn't. Does the article mention anything that makes them particularly vulnerable, or is it just about how bad such a hack would potentially be because...